Tuesday, January 1, 2019

CCNA (Version 1.1) - CyberOps Chapter 5 Exam Answers


www.metime.web.id



Chapter 5 :
Grade Score 95%

1.What are two types of addresses found on network end devices? (Choose two.)
UDP
return
IP
TCP
MAC

2. Which OSI layer header is rewritten with new addressing information by a router when forwarding between LAN segments?
Layer 2
Layer 3
Layer 4
Layer 7

3. Which protocol provides authentication, integrity, and confidentiality services and is a type of VPN?
MD5
AES
ESP
IPsec

4.What are two uses of an access control list? (Choose two.)
ACLs can control which areas a host can access on a network.
ACLs provide a basic level of security for network access.
Standard ACLs can restrict access to specific applications and ports.
ACLs can permit or deny traffic based upon the MAC address originating on the router.
ACLs assist the router in determining the best path to a destination.

5.Which protocol or service is used to automatically synchronize the software clocks on Cisco routers?
SNMP
NTP
DHCP
DNS

7.Which wireless parameter is used by an access point to broadcast frames that include the SSID?
passive mode
security mode
channel setting
active mode

8.A Cisco router is running IOS 15. What are the two routing table entry types that will be added when a network administrator brings an interface up and assigns an IP address to the interface? (Choose two.)
route that is learned via OSPF
route that is learned via EIGRP
route that is manually entered by a network administrator
directly connected interface
local route interface

9. Refer to the exhibit. The network "A" contains multiple corporate servers that are accessed by hosts from the Internet for information about the corporation. What term is used to describe the network marked as "A"?
perimeter security boundary
internal network
DMZ
untrusted network

10.What is the role of an IPS?
to detect patterns of malicious traffic by the use of signature files
to filter traffic based on defined rules and connection context
to filter traffic based on Layer 7 information
to enforce access control policies based on packet content

11.Which two features are included by both TACACS+ and RADIUS protocols? (Choose two.)
SIP support
password encryption
802.1X support
separate authentication and authorization processes
utilization of transport layer protocols

13.What does the TACACS+ protocol provide in a AAA deployment?
AAA connectivity via UDP
compatibility with previous TACACS protocols
authorization on a per-user or per-group basis
password encryption without encrypting the packet

14.Which parameter is commonly used to identify a wireless network name when a home wireless AP is being configured?
ESS
SSID
ad hoc
BESS

15.What information within a data packet does a router use to make forwarding decisions?
the destination service requested
the destination IP address
the destination host name
the destination MAC address

16.Which protocol creates a virtual point-to-point connection to tunnel unencrypted traffic between Cisco routers from a variety of protocols?
GRE
IPsec
OSPF
IKE

18.Which two statements are true about NTP servers in an enterprise network? (Choose two.)
NTP servers at stratum 1 are directly connected to an authoritative time source.
NTP servers ensure an accurate time stamp on logging and debugging information.
There can only be one NTP server on an enterprise network.
All NTP servers synchronize directly to a stratum 1 time source.
NTP servers control the mean time between failures (MTBF) for key network devices.

19.What is true concerning physical and logical topologies?
Physical topologies display the IP addressing scheme of each network.
Logical topologies refer to how a network transfers data between devices.
The logical topology is always the same as the physical topology.
Physical topologies are concerned with how a network transfers frames.

20. Which layer of the hierarchical design model is a control boundary between the other layers?
access
network
distribution
core

21.Which protocol or service allows network administrators to receive system messages that are provided by network devices?
NTP
NetFlow
SNMP
syslog

22.What is a function of a proxy firewall?
uses signatures to detect patterns in network traffic
connects to remote servers on behalf of clients
drops or forwards traffic based on packet header information
filters IP traffic between bridged interfaces

23.What is the function of the distribution layer of the three-layer network design model?
aggregating access layer connections
providing high speed connection to the network edge
providing secure access to the Internet
providing direct access to the network

24.Which LAN topology requires a central intermediate device to connect end devices?
star
ring
bus
mesh

25.Which device can control and manage a large number of corporate APs?
switch
WLC
router
LWAP
26.For which discovery mode will an AP generate the most traffic on a WLAN?
active mode
mixed mode
passive mode
open mode

27.What is a feature of the TACACS+ protocol?
It utilizes UDP to provide more efficient packet transfer.
It hides passwords during transmission using PAP and sends the rest of the packet in plaintext.
It encrypts the entire body of the packet for more secure communications.
It combines authentication and authorization as one process.


28.What is the only attribute used by standard access control lists to identify traffic?
source MAC address
protocol type
source IP address
source TCP port

29.
www.metime.web.id
31.
www.metime.web.id


EmoticonEmoticon